Bookmark this blog! New videos will be added in the near future.

Thank You!

At Cisco Live Orlando 2018, Chuck reminded all of us how applaudable you network engineers and managers are. You enabled our world of internet, e-commerce, mobile devices, collaboration, AI, IoT, you name it! All was made possible by what you do.

As You Innovate…

As you and your business continue to innovate, you will face the risks that come with it, and security must be one of the top priorities. For this, Cisco has designed Cisco Tetration that brings you holistic workload protection for multicloud data centers.

Top Notch Data Center Security

To get started, the following series of light-board videos will help you understand conceptually what are the security aspects you need to pay attention to, and how Cisco Tetration can address your data center security and visibility problems. At the end of the videos, I recommend you to watch a series of demos.

Overview: Cloud Workload Protection with Cisco Tetration

Learn how to protect cloud workload with Loy Evans, a must-have knowledge for all network/data center administrators

Overview: Difference Between Whitelist and Blacklist Policy in Cisco Tetration

Learn what the differences between Whitelist and Blacklist policy are, and how you can use them for a more secured network.

.

Overview: How to Use Annotations to Provide Key Context in Cisco Tetration

Learn how to use annotations to provide key context for the information you see in Cisco Tetration and make better assessment to build a more secured data center.

.

Overview: How to Solve the Network Visibility Problem with Cisco Tetration

See how you can solve your network visibility problems.

.

Overview: Network Visibility vs. Host Visibility with Cisco Tetration

Learn what the differences are between network visibility and host visibility, what type information each of them present, and how to make better assessment about your network.

Next

Impressed by these concepts yet? Watch actual demos to see Cisco Tetration in action:


Tags:

Attachments

  • Original document
  • Permalink

Disclaimer

Cisco Systems Inc. published this content on 20 June 2018 and is solely responsible for the information contained herein. Distributed by Public, unedited and unaltered, on 20 June 2018 23:07:06 UTC